Proceedings of the 8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing 2012
DOI: 10.4108/icst.collaboratecom.2012.250467
|View full text |Cite
|
Sign up to set email alerts
|

Access Rule Consistency in Cooperative Data Access Environment

Abstract: In this paper we consider the situation where a set of enterprises need to collaborate to provide rich services to their clients. Such collaboration often requires controlled access to each other's data, which we assume is stored in standard relational form. The access control is provided by a set of access rules that may be defined over the joins of various relations. In this paper we introduce the notion of consistency of access rules and devise an algorithm to ensure consistency. We also consider the possib… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
7
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
2
2
2

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 21 publications
0
7
0
Order By: Relevance
“…Research by Le et al [43], Burnap et al [44], and Demchenko et al [45] all describe access control for privacy protection in collaborative environments. Research by Le et al [43], Burnap et al [44], and Demchenko et al [45] all describe access control for privacy protection in collaborative environments.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Research by Le et al [43], Burnap et al [44], and Demchenko et al [45] all describe access control for privacy protection in collaborative environments. Research by Le et al [43], Burnap et al [44], and Demchenko et al [45] all describe access control for privacy protection in collaborative environments.…”
Section: Related Workmentioning
confidence: 99%
“…Research by Le et al [43], Burnap et al [44], and Demchenko et al [45] all describe access control for privacy protection in collaborative environments. Le et al [43] present a solution to this problem in the context of rich data services. Burnap et al [44] focus on solving this problem through embedding policies in each distributed machine, all relating to a shared file.…”
Section: Related Workmentioning
confidence: 99%
“…Consistency is introduced for practical reasons -it is very difficult to know, much less control, what a party does with the data that it can access. As discussed in detail in [13], consistency can be enforced by taking the given rules and generating all valid compositions of them. This leads to an explicit representation of all rules and implies that any valid access will be authorized by exactly one rule.…”
Section: Introductionmentioning
confidence: 99%
“…Mark r t as totally enforced and add to Graph; 6: for JPL = 2 to JPL max do 7: for each rule r t of this JPL do if r t can be maximally enforced by p using r 1 , r 2 ∈ RRS(r t ) then 13:…”
mentioning
confidence: 99%
“…Since each party is likely to frame rules from its own perspective, the rules taken together may suffer from inconsistency, unenforceability, and other issues. The consistency problem refers to the fact that if a party is provided access to two relations, say R and S, it is very difficult to prevent it from joining these relations, but the rule may deny access to R S. Our previous research has addressed this issue [12] and here we simply assume that the rules are upwards closed, i.e., access to R and S will automatically enable access to R S. The enforceability problem can be illustrated as follows: If a party P is given access to R S but it and no other party has access to both R and S, it is not possible to actually compute R S. We have examined this problem in [13]. In some cases, enforceability requires introducing a trusted third party [14] that is given sufficient access rights to perform the operation in question (e.g., R S in our example).…”
Section: Introductionmentioning
confidence: 99%